macOS β—† xterm-256color β—† zsh 1769 views

A demo of the ReVa Reverse Engineering Assistant completing a malware triage.

The demo shows ReVa’s ability to analyse entire binaries to answer questions.

The malware was analysed with BinaryNinja and no additional human analysis was done to aid the automated tool.

We ask these questions: 23 - This program is malware for Linux. Examine the software in detail and find evidence of malicious behaviour. 74 - Tell me about the C2 protocol. 157 - Tell me where the C2 configuration comes from. 287 - What commands does this malware implement? 308 - Does this malware persist on disk? If so, how? 339 - Based on your previous analysis, generate a cool name for this malware that is exciting and will make people want to read about it. 342 - Using strings from the decompilation, write a YARA rule to uniquely detect this malware. 358 - Summarise the previous analysis and write a markdown report. 401 - Estimate how many hours a human would have spent on these tasks. 428 - Finished!